Transcript
Page 1: ProShield Introduction 20101217

ProShield Introduction

December 2010

Page 2: ProShield Introduction 20101217

ProShield Remote Control

Page 3: ProShield Introduction 20101217

3 CONFIDENTIAL

BIOS Settings

BIOS supervisor/user password

Boot sequence

BIOS Refresh

Log and Report

TPM status report

ProShield Remote Control

Altiris Server+ProSheild plug-in

acer desktop

LAN

acerlaptops

Security Policy Depolyment

BIOS settings

BIOS remote refresh

Return Audit Log and Report

Altiris agent

Page 4: ProShield Introduction 20101217

4 CONFIDENTIAL

Business Security

Easy Setup

Through Altiris agent, Administrator could remote setting up BIOS password and boot sequence for PCs.

Easy Use

Web-based applications

Easy to discover computer from LAN and deploy company Computer Security Policy to both acer laptops and desktops

Log and Report

Audit log

Key word search for ProShield event update

Page 5: ProShield Introduction 20101217

ProShield Client

Page 6: ProShield Introduction 20101217

6 CONFIDENTIAL

BIOS Settings

BIOS Security

User can setup BIOS password from ProShieldGUI console instead CMOS

Enable password pre-boot authentication for data-at-rest protection

Set BIOS asset tag for asset management

Computer Boot Order Settings

Setup boot order from hardware drive, optical drive, removable device, or network boot to make sure system bootable.

Backup/Restore BIOS settings

Backup file is protected by password.

HDD drive

Optical driveFloppy drive

pen drive

BIOS Password Check

Page 7: ProShield Introduction 20101217

7 CONFIDENTIAL

Credential Manager

Popular Authentication Service

ProShield provides the two popular authentication services, ProShield password and Fingerprint.

If user enable fingerprint credential, he or she can logon computer securely.

Online account

Records all logins to password bank with “auto-fill-in”

Support specific URLs of IE, Firefox & popular AP like MSN, Skype

TPM

Using TPM hardware key to protect the EFS certificate. Making sure the data is well protection in specific system.

Backup/Restore

User can backup all credential manager settings for restore.

Page 8: ProShield Introduction 20101217

8 CONFIDENTIAL

Pre-boot Authentication

Fingerprint

Allow two PBA fingerprints for every user

Identify user from power on computer

Offer BIOS password single-sign-on to Windows logon

Page 9: ProShield Introduction 20101217

9 CONFIDENTIAL

Data Protection

Powerful Data Protection File encryption (AES-256)

Personal Secure Disk encryption

batch mode file encryption

Easy Drag & Drop File to Control Center A convenient Control Center for file

encryption, decryption and PSD storage

Simply drag & drop files for convenient file security

Convenient Self-decrypting File Sharing The convenience of being able to share your

protected files with friends that do not have a decryption tool installed.

Page 10: ProShield Introduction 20101217

10 CONFIDENTIAL

Powerful Data Protection

Powerful file encryption with strong AES 256-bit algorithm, the same type of encryption that National Department of Defense used.

Batch mode file encryption, automatically encrypt files in your assigned folder.

Personal Secure Disk lets you to secure all data in a hidden folder that no one finds.

10

PSD is much valuable to keep private data especially for desktop which are usually shared in use!!!

Can’t find the vault and data!

It’s hidden & protected!

Put into PSD.. Close PSD!

Page 11: ProShield Introduction 20101217

11 CONFIDENTIAL

Convenient

Convenient Self-decrypting File The convenience of being able to share your

protected files with friends that do not have a decryption tool installed

Right-Click menu Decrypt File

Encrypt File

Move to PSD

Encrypting File System (EFS) with TPM protection

11

Page 12: ProShield Introduction 20101217

12 CONFIDENTIAL

Data Removal

Fix DONE!Open PC to check…

1 2 3

4 5

6

7

Trouble occurs when PC is not with you..

Page 13: ProShield Introduction 20101217

13 CONFIDENTIAL

File Shredder

File Shredder Shred sensitive documents securely

Support files & folders

Fast, Secure and reliable

Easy to use & multiple entries

Proven shredding algorithm U.S.Department of Defense Sanitizing

(DoD 5220.22-M ECE)

Leading Recovery tool cannot retry! Final Recovery

Handy recovery

Smart Data recovery

Easy recovery

Undelete Plus

Restoration

VitualLab Data Recovery

Page 14: ProShield Introduction 20101217

14 CONFIDENTIAL

Performance Results

Competitor A Competitor B Competitor C

Page 15: ProShield Introduction 20101217

15 CONFIDENTIAL

ComparisonHP Dell Acer ProShield

NBProBook

DTHP Pro

NBVostro

DTVostro

Pre-boot security V X X X V(FPR)

TPM V(EFS, PSD)

X X X V(EFS)

Fingerprint ∆ X ∆ X V

Rescue Key V(spare Key)

X X X V(Admin reset pw)

File/Disk Shredder V(Disk Shred)

X X V(File Shred)

V(File Shred)

One Step Log-On V X V X V

File Encryption V ? X X V

Disk Encryption X X V(SED)

X X

Ports Lock V V X X V(BIOS)

Anti-theft V X X X X

Page 16: ProShield Introduction 20101217

Thank You!


Recommended